Category: Security & Privacy

Keeping safe

blank

How to change your server signature

Disguising your server signature is always a good idea as you wont reveal the operating system to potential script kiddies and hackers. Connect to your server via SSH and login as admin, then 'su -' to root. Type the following...

/ 9 December 2004
blank

HERE ARE SIX SIMPLE THINGS YOU CAN DO TO HELP KEEP SPAM AT BAY

Check out those basic rules to avoid spam robots to use your email for spaming ! 1) NEVER RESPOND TO SPAM Oh sure, they say they?ll take your name off the list, but they?re lying. What they really want to...

/ 6 September 2004
blank

How To Install RKHunter

RKHunter also known as RootKit Hunter is a scanning tool to ensure you for about 99.9% that you don't have any rootkits, backdoors, and local exploits but running tests and e-mailing you results. How To Install RKHunter RKHunter - (RootKit...

/ 18 August 2004
blank

How To Install CHKROOTKIT

chkrootkit: shell script that checks system binaries for rootkit modification. How To Install CHKROOTKIT The following tests are made: aliens asp bindshell lkm rexedcs sniffer wted w55808 scalper slapper z2 amd basename biff chfn chsh cron date du dirname echo...

/ 18 August 2004
blank

Install BFD (Brute Force Detection)

BFD is a modular shell script for parsing applicable logs and checking for authentication failures. What is Brute Force Detection? (BFD) BFD is a modular shell script for parsing applicable logs and checking for authentication failures. There is not much...

/ 17 August 2004
blank

Disable Telnet Access

Telnet should be disabled, and you should use SSH. Telnet sends password in plain text, and 'crackers/hackers' can obtain these passwords easily compared to SSH, and then takeover your dedicated web server. 1. Login to your dedicated server via SSH...

/ 17 August 2004
blank

Force the use of SSH protocol 2

SSH Protocol 1 based systems are facing many automated "root kits". As a result to step up the security Protcol 2 should be enabled as soon as possible. The reason to use SSH Protocol 2 on your dedicated webserver is...

/ 17 August 2004
blank

Install LogWatch

Logwatch is a customizable log analysis system. Logwatch parses through your system's logs for a given period of time and creates a report analyzing areas that you specify, in as much detail as you require. Logwatch is easy to use...

/ 23 July 2004
blank

Disabling Direct Root Login (SSH)

Disabling root login via shh is a great way to tigthen security on your dedicated server.Disabling root login will force any attempted hackers to use 2 passwords making the odds of him breaking in even harder. Now we know you...

/ 17 July 2004
blank

.htaccess Tutorial

In this tutorial you will find out about the .htaccess file and the power it has to improve your website. Although .htaccess is only a file, it can change settings on the servers and allow you to do many different...

/ 2 July 2004